Summary Of Blue Pill

Good Essays
This abstract is a summary of research into malware called ‘Blue Pill’. It was developed by a security researcher named Joanna Rutkowska, a low-level security and stealth malware researcher. Her intention was to show that a prototype malware, code-named Blue Pill, could "100 percent undetectable” (Vaas, 2007). She created it as part of a research project. It worked by bypassing Microsoft 's digital signature protection for kernel mode drivers. The Blue Pill malware is like the movie, “The Matrix”. The user was unable to distinguish between what was real and what was not (Heary, 2016). They would therefore continue to use the system as if it were secure, when they were actually revealing valuable data to hackers.

A blue
…show more content…
She wanted to prove that she could create a collection of computer software that would remain undetectable (Vaas, 2007). How did it work? It manipulated registers, input/output, and registers, among other processes, for virtual operations at the hardware level (Beaver, 2016). It exploited the fact that the virtualization technology was vulnerable, and entered the system through administrative access. When users installed a new version of Windows, they usually installed many programs and services of which they were not aware (South University Online, 2016). The ‘Blue Pill’ took advantage of this vulnerability and infected the virtual system. Therefore, in a business setting, it is best to have the system administrators control the installation and upgrades of any software to the system because they will be more aware of any system …show more content…
However, in order to understand what the malware does, it is necessary to understand the working of the computer system. At the core of the system is the kernel, or nucleus. This is a computer program that is the core of the system. It controls everything in the system and is the first program loaded at the startup (Rouse, 2016). It is normally loaded into a protected area of memory and takes requests from the software and translates it for use by the

Related Documents

  • Decent Essays

    Many system are designed to provide Role based access Control (RBAC). But if the procedures are not define then RBAC has little use if any. For example , in the scenario the end result showed that the intruder had gain access to the server and the desktop through weak passwords. For both systems the (IUSR_WIN and SUPPORT) account were change on January 29,…

    • 1086 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Some organizations still use outdated machines because they cannot afford to upgrade. It is not in their budget, so Microsoft systems that run 2003??? May still be infected with the Conficker virus. Conficker affected Windows 2000 Service Pack (SP) 4, Windows XP SP2 and SP3, Windows Server 2003 SP1 and SP2, Vista Gold SP1, Windows Server 2008 and Windows 7 systems. It then patched the “hole” at Port 445 to inhibit other malware from exploiting the system’s vulnerability (Krepinevich, 2012).…

    • 1330 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Specifically, I used the Jet Brains PyCharm IDE for development (PyCharm: Download Latest, 2016). I chose this due to its error checking of code and debugging capabilities. As already explained, initially the command and control server was to use sockets to communicate with clients. This did not pan out. Instead, I utilized the “http.server” library in python (http.server--HTTP Servers, 2016).…

    • 2049 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    The major difference is that in Linux the users can access and alter the kernel which is the very foundation of the program while Windows has a close-sourced code foundation. Linux is constantly being updated so any bugs or issues are worked out. The next major difference is the licensing freedom versus the licensing restrictions. Windows allows you to install the operating system into one computer while Linux allows one license to be used in multiple computers. Customer support is actually handled similarly between the two operating systems.…

    • 1966 Words
    • 8 Pages
    Decent Essays
  • Decent Essays

    Firewall Vs Firewall

    • 1167 Words
    • 5 Pages

    This harmful software can be in the form of virus, Trojans, etc. Mostly they affect the speed of the computer, delete important files and create a window for hackers to access important files and personal information. It is important to have antivirus installed in the computer even though it is virus free. This protects the PC from future attacks and damage. Some of the antivirus are built with the ability to update automatically hence making them more efficient in protecting the PC from newly created viruses.…

    • 1167 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Midori Case Study

    • 1833 Words
    • 7 Pages

    DESIGN METHODOLOGY This section contains Midori overall design methodology. Midori operating system design is based on some important modules like: • Microkernel architecture • Software Isolated Processes (SIPs) • Contract Based Channels • Metadata Infrastructure A. Kernel It is important part of the system. It acts as a bridge between programs and hardware of the system. Its Primary Purpose is to manage the computer’s resources along other programs to run use these resources. The kernel takes responsibilities for deciding at any time which of the running programs should be allocated to the processor and is responsible for deciding that which memory each process can use, determining what to do when not enough memory is available.…

    • 1833 Words
    • 7 Pages
    Decent Essays
  • Decent Essays

    Finfisher Case Study

    • 1271 Words
    • 5 Pages

    FinFisher: Disguising Greed as Security Gamma International is a company that provides a software solution for organizations that need intelligence to maintain security. In order to get intelligence, FinFisher (the software tool) uses various methods in order to tap into people 's daily routines, including screenshots of desktops at regular intervals, webcam hijacking, and keylogging. This spyware can get into computers through seemingly harmless methods such as email attachments. With this much power, FinFisher can give organizations the ability to enforce almost any law simply because they have so much information they can use to blackmail. Although this can provide a very large amount of security, if given to the wrong hands,…

    • 1271 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Ubuntu Computer Case Study

    • 2099 Words
    • 9 Pages

    What LTS exactly does is it provides support including updates and security patches to the Ubuntu Stack (cloud computing infrastructure). Since many Ubuntu Developers are maintainers of key packages within Debian, They Cooperate each other and the Ubuntu packages are based on Debian’s unstable branch packages, so there are some of the format that can be transferable ‘Both distributions use Debian’s deb package format and package management tools (APT and Ubuntu Software Center)(Wikipedia Encyclopedia, Ubuntu (Operating system), n.d).’.Because of this, these two does not need to be binary compatible to each other but, in few cases, to use the source in Ubuntu from deb packages, needs to be rebuilt. Before they release the package, they try to merge with Ubuntu-specific…

    • 2099 Words
    • 9 Pages
    Decent Essays
  • Decent Essays

    Teslacrypt Analysis

    • 1012 Words
    • 5 Pages

    Teslacrypt (a.k.a. EccKrypt ) is a malicious program that encrypts users ' files without the knowledge or consent of the user. It falls into the sub-category of ransomware, a type of malware that encrypts the user 's files using AES encryption and forces them to pay a certain amount of money to decrypt the user 's information, essentially holding a person 's data as hostage. It first emerged around February 2015 along with its counterpart, Alphacrypt, which was released in April 2015, and it has proven capable of infecting most versions of Windows including Windows XP, Windows Vista, Windows 7 and Windows 8. It can infect multiple types of files, but among the most infected are video game files, including, but not limited…

    • 1012 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Social Media Frauds

    • 1274 Words
    • 5 Pages

    Always have a strong password because hackers use software to figure them out and never connect to an unsecure Wi-Fi connection. By following this simple guide line you will not only improve your security but as well as your experience online. Just like the business website Nimble said “if you want to improve your customer relations, make sure you have a site that is safe and secure in all browsers “(1). Internet companies with that mentality can create long term users and costumers giving them reassurance and starting an internet movement to reinforce cyber security for safety and enjoy of all the internet users of the…

    • 1274 Words
    • 5 Pages
    Decent Essays